Monday, 2013-05-20

*** joevano has quit (Quit: leaving)11:57
*** joevano (~joevano@bzflag/developer/JoeVano) has joined #wikid12:17
*** joevano has quit (Client Quit)12:18
*** joevano (~joevano@bzflag/developer/JoeVano) has joined #wikid12:18
*** nowen (~nowen@99-174-93-102.lightspeed.tukrga.sbcglobal.net) has joined #wikid12:40
coolacidHey, nowen any docs on how the new beta version would work for HA/Cluster?14:31
nowennot much, some install docs.  what do you want to see?14:32
coolacidI think some design docs, and how to configure? (Not that I expect you to have them right now).14:33
coolacidAlso, any updated transaction/sec tests kicking around?14:33
nowenby design - do you mean how to integrate into your network arch?14:34
coolacidNo, I assume it would be the same as before, just add a failover component (multiple radius servers I assume).14:35
nowencorrect14:35
coolacidSo, one "master" multiple slaves?14:36
coolacidSo you always write to one, and all the others are slaves?14:36
nowenno, it is master-master.  whichever one is closest gets the tx14:36
coolacidWhat happens if the query starts on one, and fails over to another..14:36
coolacidAhh, so HA, not cluster.14:37
coolacidOk.14:37
coolacidI was more thinking about the new version with global load balancing ;)14:37
*** nowen has quit (Quit: Leaving.)15:29
*** nowen (~nowen@99-174-93-102.lightspeed.tukrga.sbcglobal.net) has joined #wikid15:35
*** nowen has quit (Ping timeout: 256 seconds)16:50
*** nowen (~nowen@99-174-93-102.lightspeed.tukrga.sbcglobal.net) has joined #wikid16:54
*** nowen has quit (Quit: Leaving.)17:52
*** nowen (~nowen@99-174-93-102.lightspeed.tukrga.sbcglobal.net) has joined #wikid17:53
*** rfxn (~teck7@bas1-montreal54-1279344592.dsl.bell.ca) has joined #wikid21:05
rfxncurrently on wikid enterprise version 3.4.87-b121621:06
rfxnwhere can i grab the latest RPM's21:06
nowenhey21:07
nowenwelcome back21:07
rfxnty21:07
rfxnabout time for our yearly renewal over at ASO too21:07
rfxnnext month i think21:07
nowenhttp://www.wikidsystems.com/downloads21:07
nowenI can get you the direct links if you want21:08
rfxnplease that would be appreciated21:08
rfxnalso how do I regenerate WiKIDCA.cer21:08
nowenthe new RPM will have the latest cert from us.  just update and create new intermediate CA and localhost cert.21:09
nowenare you using any wAuth network clients?21:09
rfxnya21:09
rfxntwo for our php interface to it21:09
rfxnto wikid rather21:09
rfxnWarning: stream_socket_client(): SSL operation failed with code 1. OpenSSL Error messages:21:09
rfxnerror:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed in /home/grovedev/public_html/ayron/libs/classes/wikid/wClient.inc.php on line 36421:09
rfxnbut we been getting cert errors21:09
nowenok - recreate those too21:09
rfxnso suspecting the cert expired or something21:09
nowenare you using our ISO?21:10
rfxndelete / readd basically?21:10
nowenyes, after restarting with the new intermediate21:10
rfxnwe are on an rpm installation on a CentOS box21:10
nowenx86 or 64?21:10
rfxnyup just recreated intermediate21:10
rfxn6421:10
nowenhttp://wikidsystems-dl.com/wikid-utilities-3.4.3-1.x86_64.rpm21:11
nowenand http://wikidsystems-dl.com/wikid-server-enterprise-3.5.0.b1428-1.noarch.rpm21:11
rfxnany notable changes recently?21:11
rfxnapart from the new site21:12
rfxnwhich looks great21:12
nowenhttp://www.wikidsystems.com/downloads/changelogs/enterprise-changelog21:12
nowenthx21:12
nowenlots of little things21:12
rfxnthe intermeidate generation stuff on the wikid site21:13
nowenok - you'll have to create another new cert after this upgrade - there is a new WiKID certificate21:13
rfxnstill says its only valid for 30d21:13
rfxnlast i recall you noted last year to just ignore that21:13
nowenyeah, we haven't implemented that yet, actually21:13
rfxnnoted21:13
nowenyes, still haven't ;-)21:13
rfxnknow how that goes, my todo list is a mile long21:13
rfxn Certificate DNs are required to be unique.21:17
rfxnIf you have previously requested a certificate you may alter the DN slighty and generate a new CSR.21:17
nowenyes - or I can delete the old one if you want21:18
rfxndelete old one please21:18
nowenok - should be clear21:19
rfxnperfect ty21:21
nowennp21:24
rfxnwhen i delete a client wauth21:26
rfxnis it supposed to leave the old key.pem for it21:26
rfxn-rw-r--r--  1 root root 1055 Apr 21  2012 GroveDev.key.pem21:27
rfxn-rw-r--r--  1 root root 2164 May 20 17:25 GroveDev.p1221:27
rfxn-rw-r--r--  1 root root 2860 Apr 21  2012 GroveDev.pem21:27
nowenit may - but it should overwrite21:27
nowenwell, you'll exported the pem from our p1221:27
rfxnprobably21:27
rfxnlol21:27
rfxnbeen a year21:27
nowen;-)21:27
nowenafter the update you can run 'keytool -list -v -keystore CACertStore' and use changeit as the passprhase.  it should show a 2023 expiration21:31
nowenare you'll still around 50 users?21:31
rfxn-rw-r--r--  1 root root 2447 Apr 23 22:11 WiKIDCA.cer21:33
rfxnis that supposed to still be that old21:33
nowenhave you done the rpm -U?21:34
rfxnya21:34
rfxnand regenerated intermediate ca, installed it and created localhost cert21:34
nowenoh- what about CACertStre?21:34
rfxnand recreated the two wauth clients21:34
rfxn-rw-r--r--  1 root root 3451 May 20 17:22 CACertStore21:34
nowenthat's the one21:34
rfxnuser count as in unique users21:35
rfxnor number of registered devices21:35
nowenformer21:37
rfxn8521:38
rfxnbut were about to audit that21:38
rfxnshould be 7121:38
nowenthough, I'm curious if your users have more than one token21:38
rfxnas we only have 71 on board staff at the moment21:38
rfxnso thats where it should be21:38
rfxnya most of our users have multiple tokens21:38
rfxn2 is the average21:38
rfxna number have 321:38
nowencool21:38
rfxn2.7 is the average21:38
rfxnLicenses In Use: 8521:38
rfxnCurrent Statistics:21:38
rfxnRegistered Devices: 19821:38
rfxnUnregistered Devices: 121:38
rfxnServed Domains: 121:38
rfxnNetwork Clients: 421:38
rfxnProtocols Enabled: 221:38
nowenanother question, while I got you.  Would you be interested in WiKID being able to re-set your AD/LDAP passwords?  What do you do for password resets now?21:39
rfxnwe dont use LDAP21:41
nowenwhat do you use?21:43
rfxnRadius21:43
rfxnwe use wikid as part of our openvpn auth system21:43
rfxnso there is only the temporary wikid token21:44
rfxnand thats it21:44
nowenBut do you have an AD/LDAP dir for your local users?21:44
rfxnwe do not21:44
rfxnwe have local users managed within our intranet system which are in MySQL as part of our larger intranet portal21:45
nowenahh21:45
rfxnand we manage wikid token codes per user from within that21:45
rfxn*device codes21:45
nowenok - well, you're not the target market21:45
nowenand if you wanted to automate user password changes to your intranet, you could do that yourself, I'm sure21:46
rfxnindeed21:46
nowenwe're looking at offering something that would push an OTP to AD/LDAP as the new password, flagged to reset. No more helpdesk calls21:48
rfxnCA Public key NOT OK! Public key NOT OK! Private key NOT OK!21:51
rfxnWarning: stream_socket_client(): SSL operation failed with code 1. OpenSSL Error messages:21:51
rfxnthoughts on tips to debug that21:51
rfxnWarning: stream_socket_client(): SSL operation failed with code 1. OpenSSL Error messages:21:51
rfxnerror:14094412:SSL routines:SSL3_READ_BYTES:sslv3 alert bad certificate in /home/grovedev/public_html/libs/classes/wikid/wClient.inc.php on line 36421:51
nowenyou restarted after adding the new cert?21:51
rfxnthe new intermediate yes21:51
rfxnthe new wauth clients no21:51
rfxnlet me restart for good measure21:52
nowenok - that's it21:52
nowencreate new wauth certs after restarting wikid21:52
nowenthen you'll have to convert the p12 to keys and a pem for php21:53
nowenI gotta go - I have a board meeting21:55
nowendo you want my email just in case?21:55
rfxnappreciate it, yes please21:57
nowennowen at wikidsystems.com21:57
rfxnperfect, thanks21:57
nowenok -later21:58
*** nowen has quit (Quit: Leaving.)21:58

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!